US20090109862A1 - Method for Reducing Fault Detection Time in a Telecommunication Network - Google Patents
Method for Reducing Fault Detection Time in a Telecommunication Network Download PDFInfo
- Publication number
- US20090109862A1 US20090109862A1 US12/086,973 US8697308A US2009109862A1 US 20090109862 A1 US20090109862 A1 US 20090109862A1 US 8697308 A US8697308 A US 8697308A US 2009109862 A1 US2009109862 A1 US 2009109862A1
- Authority
- US
- United States
- Prior art keywords
- switch
- router
- network
- routers
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 238000001514 detection method Methods 0.000 title claims abstract description 13
- 238000013507 mapping Methods 0.000 claims description 27
- 238000005516 engineering process Methods 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 230000006870 function Effects 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- ABEXEQSGABRUHS-UHFFFAOYSA-N 16-methylheptadecyl 16-methylheptadecanoate Chemical compound CC(C)CCCCCCCCCCCCCCCOC(=O)CCCCCCCCCCCCCCC(C)C ABEXEQSGABRUHS-UHFFFAOYSA-N 0.000 description 1
- 241000764238 Isis Species 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- RGNPBRKPHBKNKX-UHFFFAOYSA-N hexaflumuron Chemical compound C1=C(Cl)C(OC(F)(F)C(F)F)=C(Cl)C=C1NC(=O)NC(=O)C1=C(F)C=CC=C1F RGNPBRKPHBKNKX-UHFFFAOYSA-N 0.000 description 1
- 238000005417 image-selected in vivo spectroscopy Methods 0.000 description 1
- 238000012739 integrated shape imaging system Methods 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 239000002957 persistent organic pollutant Substances 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000004904 shortening Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/28—Routing or path finding of packets in data switching networks using route fault recovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/55—Prevention, detection or correction of errors
- H04L49/555—Error detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/35—Switches specially adapted for specific applications
- H04L49/351—Switches specially adapted for specific applications for local area network [LAN], e.g. Ethernet switches
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/60—Software-defined switches
- H04L49/602—Multilayer or multiprotocol switching, e.g. IP switching
Definitions
- the present invention relates to a method for reducing fault detection time in a telecommunication network.
- IP Internet Protocol
- VoIP Voice over IP
- video communications require high levels of reliability and availability that translate into increasingly pressing requirements regarding the performance of network safety mechanisms in the case of a fault.
- the protocols of the Internet Suite can be used to implement widespread communications, via a group of individual networks, different for the type of technology used, in particular both of local type (Local Area Networks—LAN) and of geographical type (Wide Area Networks—WAN), which are interconnected in various ways to form what, as a whole, is typically called an internetwork.
- LAN Local Area Networks
- WAN Wide Area Networks
- IP networks or internetworks are thus created via the interconnection of various subnetworks, through devices called routers, which are capable of forwarding data packets to the destination network based on the address contained within them.
- routers process data packets at Layer 3 (Network Layer) and implement the transfer of information (routing) from the source to the destination via the IP network.
- data packets generally pass through one or more intermediate nodes (routers), each of which determines, based on the contents of its own routing table, which is the next router (generally known as next hop) to which data packet are to be forwarded in order to reach the final destination.
- the look-up in the routing. table for the next hop to use involves running a so-called “longest match” process on the address prefixes contained in routing table, using the destination IP address of the data packet being processed as the look-up key.
- routing is normally performed by using dynamic routing protocols that first acquire information of the network topology, then compute the route to the destination based on the network topology and appropriate cost metrics, and finally allow the contents of the routing table to be automatically compiled and updated.
- Routers can be interconnected via several different transmission technologies, among which Local Area Networks (LAN) and Metropolitan Area Networks (MAN) represent transmission technologies of particular interest because they employ network devices which are known as switches and are widely used in the creation of data packet networks, in particular switches based on Ethernet technology.
- switches are devices that perform functions that, for some aspects, are similar to those performed by routers, and are used to make sub-networks that are homogeneous in terms of the technology employed. Nevertheless, unlike routers, switches process data packets at Layer 2 (Link Layer) of the OSI model, and this function is generally know as “bridging”. The main difference between routers and switches is thus determined by the different “positioning” of the respective functions in the layered network architecture.
- switching is managed by consulting a bridging table in which, in correspondence to the Layer 2 addresses, also known as Medium Access Control (MAC) addresses, there are specified the ports on which the respective data packets with a particular destination MAC address must be transmitted.
- MAC Medium Access Control
- the bridging tables are not compiled via routing protocols, but via learning mechanisms which are based on inspection of the MAC addresses of the received data packets, and which, in the case of unknown MAC addresses, provide for the broadcast (or flooding) transmission of the data packet on the ports.
- routers When faults occur that involve routers or transmission links, routers must be able to detect the unreachability of the neighboring nodes and ensure the recovery of data packet forwarding, using any alternative routes that are available.
- Rapid convergence of the routing protocol can be achieved only by promptly identifying the occurrence of a fault, or rather the unreachability of a neighboring router.
- routing protocols utilize the periodic exchange of appropriate messages, generally known as “hello” messages, for checking the reachability of neighboring routers, and fault detection time depends on the frequency of the “hello” messages.
- this frequency cannot easily be increased due to the processing load that the management of the “hello”, messages involves and the additional traffic on the network.
- the generation frequency of the “hello” messages is set to one each ten seconds and a connectivity is declared as lost when non-reception of a predetermined number (typically four) of consecutive reply messages is detected, or when a predetermined maximum time (such as forty seconds) is passed from reception of the last message. This limitation becomes even more evident the larger the number of neighboring routers with which the “hello” messages must be exchanged.
- fault detection and notification of this event to the routing protocol is, as a rule, expediently entrusted to the lower layers, such as the physical or data link layer.
- the lower layers such as the physical or data link layer.
- This is the case of links based on SONET/SDH transmission systems or on Frame Relay or ATM virtual circuits.
- FIG. 1 shows an example of traffic rerouting in a multiaccess local network with one Ethernet switch.
- the configuration shown in general terms in FIG. 1 corresponds to a typical situation that occurs in some scenarios of practical interest.
- a typical application in this respect can be found in the context of the structure of a Point Of Presence (POP), i.e. a node of a Service Provider's IP backbone network, in order to create an. interconnection, inside the POP, between routers belonging to different levels of the network structure.
- POP Point Of Presence
- routers A and B may perform the link functions (gateway) to the external networks of other Service Providers or to the Internet network
- routers E and D may belong to the backbone transit segment, i.e. they terminate the wide-area connections with other POPs.
- a similar configuration may also be used for interconnecting Service Provider's access routers E and D, which terminate client links, with the transit routers A and B.
- Another possible practical application of this layout is represented by the collection and aggregation of the traffic, in local environments or distributed on a metropolitan/regional scale, of client access devices for their interconnection to the POP's routers.
- router A reaches router F via route i including link L AC , switch C, link L EC , router E, and link L EF .
- a fault involving link L EC causes loss of traffic originating from router A until it is rerouted.
- switch C has no way of informing router A of the fault, and therefore router A detects the fault only after losing a number of “hello” messages, with a consequent loss of traffic for at least thirty seconds (using default values).
- the routing algorithm running in router A recomputes a new route j, via router D, on which the traffic directed to router F can be rerouted.
- This routing inefficiency is due to the fact that switch C is not configured to propagate information regarding the state of its own interfaces to the routers, and hence the routers must rely exclusively on the “hello” messages generated by the routing protocol.
- MCP MultiAccess Reachability Protocol
- IETF Internet Engineering Task Force
- US 2005/0018667 discloses a system and method for exchanging awareness information in a network environment, including receiving a packet at a network element and identifying a sequence number included in the packet that correlates to awareness information associated with one or more adjacent network elements.
- a table included in the network element may be updated in order to account for the awareness information included within the packet that has not been accounted for by the network element. In cases where the awareness information included in the packet has already been accounted for, the packet may be ignored.
- the Applicant has observed that the known solutions, and in particular the proposed MARP protocol, are capable of reducing the fault detection time but require that both the switch and the routers in the local network implement the MARP protocol, namely that the routers implement the functionality of a MARP protocol Client, while the switches must implement the functionality of the Server.
- a solution to the fault detection problem that requires that all the routers in the local area network implement the functionality of this new protocol constitutes a restriction which turns into a limitation in the practical application of the solution.
- the objective of the present invention is to provide a method and a system for reducing the delay in detecting a fault in a local area network, such as an Ethernet network, in which routers are interconnected via switches, without requiring any intervention on the routers.
- a local area network such as an Ethernet network
- switches are apparatuses suitable to process data packets at Layer 2 (Link Layer) of the OSI model
- routers are apparatuses suitable to process data packets at Layer 3 (Network Layer) of the OSI model.
- This objective is achieved by the present invention in that it relates to a method for reducing fault detection time in a network, to a network, and to a software product as defined in the appended claims.
- the present invention achieves the aforementioned objective by configuring a network switch, which is preferably an Ethernet switch, in such a manner that it may identify the routers connected to it, putting them in relation to the physical interfaces through which they are reachable and, when a fault occurs on one or more physical links to one or more IP routers, allows all of the other routers still connected to be immediately notified of the fault occurrence, so that they can rapidly reroute traffic on alternative routes, if available.
- a network switch which is preferably an Ethernet switch
- the proposed method does not require any new functionality at IP router level and exploits the mechanisms of the routing protocols normally used on IP networks, especially those of the Link State type (OSPF and ISIS).
- the Ethernet switch although not participating in the IP routing protocol together with the routers, is configured to intercept and generate routing messages. Then, the Ethernet switch, by intercepting the routing messages or through an explicit management system configuration, reconstructs the number and position of the routers directly connected to it. When a fault interrupts one or more of the links between the Ethernet switch and the routers, the switch is able to rapidly detect the fault through the Ethernet Layer 2 functions, and can send a message to all of the IP routers still connected, signaling the fault occurrence and the consequent unreachability of certain routers.
- the “hello” messages of the routing protocol can be used to communicate this information.
- These “hello” messages contain a list of the IP routers neighboring on the originating router, so that each router can check mutual reachability with its neighboring routers. Therefore, the immediate closure of the routing adjacencies may be triggered, causing the traffic to be rerouted, by simply generating a “hello” message with an empty neighbor list.
- source router designates a router that originates some traffic sent over a local area network to a second router attached to the same local area network, this second router being therefore designated as “destination router”.
- the present invention thus relates to a method for reducing fault detection time in a telecommunication network including routers configured to exchange messages via at least one switch, the method comprising the steps of:
- Sending a network fault message preferably includes:
- the extracted information preferably includes a list of routers reachable by the first router via the switch.
- the fake information preferably includes an empty list of routers reachable by the first router via the switch.
- Sending a network fault message may include:
- the network fault message may be sent to all the other routers connected to the switch.
- Sending a network fault message preferably also includes determining routers connected to the switch.
- Determining routers connected to the switch may include:
- the method may further comprise determining, by a network operator, the routers connected to the switch.
- the method may comprise determining, by the switch, the routers connected to the switch.
- Generating a correspondence table may include:
- Generating a correspondence table may further include:
- Sending a network fault message may include:
- the network is preferably a multiaccess local area network.
- the multiaccess local area network is preferably an Ethernet network.
- the present invention also relates to a switch for a telecommunication network, configured to implement the method according to the above.
- the present invention further relates to a network including at least one switch and routers configured to exchange messages via the switch, the switch being configured to implement the method according to the above.
- the present invention also relates to a software product able, when loaded and run in a switch of a network, to implement the method according to the above.
- FIG. 1 shows an example of traffic rerouting in a multiaccess local network with one Ethernet switch
- FIG. 2 shows an example of traffic rerouting in a multiaccess local network with two Ethernet switches
- FIG. 3 shows a flowchart of a learning phase of the method according to the present invention
- FIG. 4 shows an example of a correspondence table
- FIG. 5 shows a classical “hello” message generated by a network router
- FIG. 6 shows a fake “hello” message generated by a network switch
- FIG. 7 shows a flowchart of an operating phase of the method according to the present invention.
- a telecommunication network including a plurality of routers and at least a switch connecting the routers, such as the one disclosed in FIG. 1 , where A, B, D, E and F are routers and C is a switch, or the one disclosed in FIG. 2 , where A, C, E and F are routers and B and C are switches.
- the present invention enables a network switch, in particular a Layer 2 switch such as an Ethernet switch interconnecting IP routers, whilst not directly participating in the IP routing protocol, to intercept and generate certain routing messages, according to a procedure composed of two distinct phases: a learning phase and an operating phase.
- a network switch in particular a Layer 2 switch such as an Ethernet switch interconnecting IP routers
- the Ethernet switch reconstructs a simplified map of IP routers connected to the Ethernet local network.
- the objective of this phase is to allow the Ethernet switch to know which IP routers are no longer connected to the Ethernet local network in the case of a fault affecting one of its interfaces.
- the map created by the switch consists of an internal correspondence table storing the association (mapping) between the identifier of each router (for example the MAC address) and the identifier of the interface on the switch itself, to which the router is directly connected, or, in the case where there are a number of cascaded-connected switches, the identifier of the interface via which the router may be reached.
- the same router can be associated with more than one interface on the same Ethernet switch, but this can only happen if these interfaces belong to different virtual Local Area Networks (VLANs): in any case, the MAC address, being univocal at the global level, allows even these situations to be efficiently handled, discriminating between the various connections.
- VLANs virtual Local Area Networks
- switch B creates a correspondence table between each one of its interfaces I 1 , I 2 , and I 3 and routers connected thereto.
- the correspondence table of switch B contains one line for each of the four IP routers A, C, E and F: router A is associated with interface I 1 , router C with interface I 2 , and routers E and F with interface I 3 .
- the correspondence table can be explicitly configured by a network operator. This solution is however feasible only if the number of routers connected to the switch is not too high.
- An alternative solution consists in leaving the Ethernet switch with the task of constructing the correspondence table.
- the switch inspects the content of “hello” messages passing through it and exchanged by the IP routers connected through it, and uses the information they carry to build the correspondence table. This operation of inspection (i.e., reading) of the content of “hello” messages will be herein after called “snooping”.
- OSPF and IS-IS Link State routing protocols
- the Ethernet switch in order to identify “hello” messages exchanged by IP routers and passing through it, the Ethernet switch intercepts data packets in “hello” messages destined to these addresses, and processes these data packets according to the following procedure.
- FIG. 3 A flow chart of a possible implementation of the learning phase is shown FIG. 3 .
- the switch When the switch intercepts a message destined to one of the above-indicated addresses, it first carries out a syntax control in order to check that it is effectively a “hello” message (block 10 ) , and, if so, then checks in the correspondence table for a mapping between the input interface (port) on which the message has been received and the MAC address of router that has sent the message (blocks 20 and 30 ). If no mapping is found in the correspondence table, the switch creates a new entry (line) in the correspondence table, inserting the mapping between the identifier of the input interface on which the “hello” message has been received and the MAC address of the router that has sent the “hello” message, and also saves the received “hello” message in the correspondence table (block 40 ).
- the “hello” message from this router already present in the correspondence table is replaced by the one just received, so as to update the information relating to this router in such a way that a copy of the last “hello” message intercepted is always saved in the correspondence table (block 50 ).
- FIG. 4 shows an example of a correspondence table relating to switch B in FIG. 2 , wherein the first column indicates the switch interfaces, the second column indicates the MAC addresses of the routers connected to the switch interfaces, the third column indicates the saved “hello” message, and each line indicates a mapping between a switch interface and a router connected thereto.
- the received “hello” messages are saved in the correspondence table to allow the switch to emulate the generation of a “hello” message that is semantically correct and consistent with the configuration of the routing protocol, as will be described in detail further on with reference to the flowchart shown in FIG. 7 and relating to the operating phase.
- a refresh timer is also associated with each line in the correspondence table.
- the refresh timer is initialized with a predefined value that, for example, could be equal to the value of the dead-interval parameter utilized by the OSPF protocol.
- the timer is decremented by one unit every second, but when a new “hello” message is received and saved in the correspondence table, the refresh timer associated to. the updated line is re-initialized again with the default value (block 50 ). If the refresh timer becomes equal to zero, the switch understands that there is a loss of connectivity on the considered interface, and the corresponding line is cancelled from the correspondence table.
- Ethernet switch When the Ethernet switch detects and identifies a loss of connectivity on one of its own interfaces, it carries out the aforementioned operating phase to immediately communicate this information to the IP routers connected thereto.
- this loss of connectivity is communicated to the neighboring routers by means of a fake “hello” message semantically consistent with those sent by the routers.
- This “hello” message is called “fake” in that it is semantically consistent with those sent by the routers and therefore it is recognized by the other routers as a classical “hello” message, but the content is different from that of a classical “hello” message, as herein below explained.
- each “hello” message sent by a router typically contains an identifier of the router and the list of the IP neighboring routers from which a “hello” message has already been received, so that each couple of routers can check reciprocal reachability in a straightforward manner.
- a switch differently from a classical “hello” message generated by a router, a switch generates a fake “hello” message containing “fake information” represented by an empty neighboring router list or, from another point of view, by the absence of a neighboring router list.
- This fake “hello” message still contains the identifier of a sender router, which is the router connected (directly or through another switch) to the interface where fault has been detected. In case of more than one router connected to such interface, a fake “hello” message is generated for each of these routers.
- FIGS. 5 and 6 show a classical “hello” message generated by a router and a fake “hello” message generated by a switch, respectively.
- both classical and fake “hello” messages includes records containing IP Packet Header, OSPF Header, Network Mask, Hello Interval, Options, Priority, Dead Interval, Designated Router, Backup Designated Router.
- the classical “hello” message generated by a router further includes an IP Neighboring Router ID list, i.e., includes an additional record for each neighboring router and containing the corresponding IP neighboring router ID, while the fake “hello” message generated by a switch includes an empty IP Neighboring Router ID list, i.e., does not include any additional record for each neighboring router.
- FIG. 7 shows a flow chart of a possible implementation of the operating phase.
- an Ethernet switch Once an Ethernet switch has detected a link fault (block 60 ) , it checks the number of entries (lines) in the correspondence table which are related to the switch interface involved in the fault, i.e. the number of IP routers reached via this switch interface (blocks 70 and 80 ). For each mapping associated with this switch interface (i.e. for each router connected, directly or through other switches, to this interface), the switch then uses the corresponding “hello” message to generate a fake “hello” message with an empty neighboring router list (i.e., it deletes the records containing the ID of the neighboring routers), broadcasts it on all its interfaces (ports), and finally deletes the corresponding entry from the correspondence table (block 90 ).
- a fake “hello” message using the source address of the router on behalf of which the message is sent, is generated for each of the above mentioned IP routers. If the last “hello” message received on the faulty switch interface is stored in the correspondence table, the switch can create the fake “hello” message from this last message, by emptying the neighboring router list, updating the “Size of Datagram” field in the IP header and the “Length” field in the OSPF header, and recomputing the Cyclic Redundancy Check (CRC), which is a well-known field of the Ethernet packet, typically of four bytes, used to detect errors that occur during transmission.
- CRC Cyclic Redundancy Check
- the Ethernet switch utilizes updated and semantically correct information, and thus suitable for being opportunely processed by the receiving routers.
- the fake “hello” message is sent over the Ethernet local network to a predefined multicast IP address, which causes it to be received and processed by all of the IP routers that participate in the routing protocol.
- the receiving routers not seeing their own identifiers in the neighboring router list contained in the fake “hello” message, declare the adjacency with the sending router closed and reroute traffic on a new route.
- the effect of generating a fake “hello” message by a switch causes the closure of adjacencies with neighboring routers that can no longer be reachable by the routers affected by the fault event, ultimately determining the desired rerouting of traffic, shortening the response times.
- the proposed method allows switch C to immediately inform routers A, B, and D of this event by sending a fake “hello” message with router E as the sender and an empty neighboring router list.
- switch C first creates an association between interface I 4 and router E, via static configuration or intercepting the “hello” messages sent by the router E.
- interface I 4 is no longer active, switch C is able to inform the other routers in accordance with the already described method.
- the present invention allows more rapid and efficient detection of loss of reachability between neighboring routers in a network, by intervening at the switch level only, i.e., without requiring that all of the routers implement the new functionality.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Monitoring And Testing Of Exchanges (AREA)
Abstract
Description
- The present invention relates to a method for reducing fault detection time in a telecommunication network.
- As is known, modern telematic networks based on the Internet Protocol (IP), such as the Internet network, henceforth referred to as IP networks, nowadays constitute the telecommunications infrastructure on which an ever-increasing number of services and applications are destined to converge. Many of the new applications, such as voice (VoIP, Voice over IP) and video communications, require high levels of reliability and availability that translate into increasingly pressing requirements regarding the performance of network safety mechanisms in the case of a fault. The protocols of the Internet Suite can be used to implement widespread communications, via a group of individual networks, different for the type of technology used, in particular both of local type (Local Area Networks—LAN) and of geographical type (Wide Area Networks—WAN), which are interconnected in various ways to form what, as a whole, is typically called an internetwork.
- The IP networks or internetworks are thus created via the interconnection of various subnetworks, through devices called routers, which are capable of forwarding data packets to the destination network based on the address contained within them.
- With reference to the Open System Interconnection (OSI) model, routers process data packets at Layer 3 (Network Layer) and implement the transfer of information (routing) from the source to the destination via the IP network. To reach the destination, data packets generally pass through one or more intermediate nodes (routers), each of which determines, based on the contents of its own routing table, which is the next router (generally known as next hop) to which data packet are to be forwarded in order to reach the final destination. The look-up in the routing. table for the next hop to use involves running a so-called “longest match” process on the address prefixes contained in routing table, using the destination IP address of the data packet being processed as the look-up key. On IP networks, routing is normally performed by using dynamic routing protocols that first acquire information of the network topology, then compute the route to the destination based on the network topology and appropriate cost metrics, and finally allow the contents of the routing table to be automatically compiled and updated.
- Routers can be interconnected via several different transmission technologies, among which Local Area Networks (LAN) and Metropolitan Area Networks (MAN) represent transmission technologies of particular interest because they employ network devices which are known as switches and are widely used in the creation of data packet networks, in particular switches based on Ethernet technology. In detail, switches are devices that perform functions that, for some aspects, are similar to those performed by routers, and are used to make sub-networks that are homogeneous in terms of the technology employed. Nevertheless, unlike routers, switches process data packets at Layer 2 (Link Layer) of the OSI model, and this function is generally know as “bridging”. The main difference between routers and switches is thus determined by the different “positioning” of the respective functions in the layered network architecture.
- In networks including switches based on Ethernet technology, switching is managed by consulting a bridging table in which, in correspondence to the
Layer 2 addresses, also known as Medium Access Control (MAC) addresses, there are specified the ports on which the respective data packets with a particular destination MAC address must be transmitted. Unlike the routing tables, the bridging tables are not compiled via routing protocols, but via learning mechanisms which are based on inspection of the MAC addresses of the received data packets, and which, in the case of unknown MAC addresses, provide for the broadcast (or flooding) transmission of the data packet on the ports. - When faults occur that involve routers or transmission links, routers must be able to detect the unreachability of the neighboring nodes and ensure the recovery of data packet forwarding, using any alternative routes that are available.
- In particular, it is the task of the dynamic routing to recompute the routes, based on the new network typology, to determine an alternative routing for the data traffic affected by the fault. In order to guarantee limited service inefficiency, especially for services characterized by more stringent requirements, such as VoIP services, it is necessary to minimize rerouting time, in particular the time needed to complete the convergence process of the routing protocol.
- Rapid convergence of the routing protocol can be achieved only by promptly identifying the occurrence of a fault, or rather the unreachability of a neighboring router.
- In order to do so, routing protocols utilize the periodic exchange of appropriate messages, generally known as “hello” messages, for checking the reachability of neighboring routers, and fault detection time depends on the frequency of the “hello” messages. However, this frequency cannot easily be increased due to the processing load that the management of the “hello”, messages involves and the additional traffic on the network. Typically, the generation frequency of the “hello” messages is set to one each ten seconds and a connectivity is declared as lost when non-reception of a predetermined number (typically four) of consecutive reply messages is detected, or when a predetermined maximum time (such as forty seconds) is passed from reception of the last message. This limitation becomes even more evident the larger the number of neighboring routers with which the “hello” messages must be exchanged.
- For this reason, fault detection and notification of this event to the routing protocol is, as a rule, expediently entrusted to the lower layers, such as the physical or data link layer. This is the case of links based on SONET/SDH transmission systems or on Frame Relay or ATM virtual circuits. These connection technologies are in fact widely exploited, especially for wide-area router interconnections, and are capable of limiting the fault detection time, reducing the overall routing protocol convergence time.
- The case in which the routers are connected via local area networks, such as Ethernet, is different. Due to its characteristics of simplicity of use and low cost, the use of this technology is widespread, especially for local connections.
-
FIG. 1 shows an example of traffic rerouting in a multiaccess local network with one Ethernet switch. The configuration shown in general terms inFIG. 1 corresponds to a typical situation that occurs in some scenarios of practical interest. A typical application in this respect can be found in the context of the structure of a Point Of Presence (POP), i.e. a node of a Service Provider's IP backbone network, in order to create an. interconnection, inside the POP, between routers belonging to different levels of the network structure. In this context, routers A and B may perform the link functions (gateway) to the external networks of other Service Providers or to the Internet network, while routers E and D may belong to the backbone transit segment, i.e. they terminate the wide-area connections with other POPs. A similar configuration may also be used for interconnecting Service Provider's access routers E and D, which terminate client links, with the transit routers A and B. Another possible practical application of this layout is represented by the collection and aggregation of the traffic, in local environments or distributed on a metropolitan/regional scale, of client access devices for their interconnection to the POP's routers. - With reference to
FIG. 1 , in normal conditions router A reaches router F via route i including link LAC, switch C, link LEC, router E, and link LEF. A fault involving link LEC causes loss of traffic originating from router A until it is rerouted. However, switch C has no way of informing router A of the fault, and therefore router A detects the fault only after losing a number of “hello” messages, with a consequent loss of traffic for at least thirty seconds (using default values). Once unreachability of router E is detected, the routing algorithm running in router A recomputes a new route j, via router D, on which the traffic directed to router F can be rerouted. - This routing inefficiency is due to the fact that switch C is not configured to propagate information regarding the state of its own interfaces to the routers, and hence the routers must rely exclusively on the “hello” messages generated by the routing protocol.
- For this reason, the need is felt for solutions that allow more rapid and efficient detection of loss of reachability between neighboring routers in the network, for routing protocol purposes, which are interconnected via a
local network Layer 2 switch. - The Internet-Draft “MultiAccess Reachability Protocol (MARP)” of A. Retana and R. White, submitted on March 2003 for the Network Working Group of the Internet Engineering Task Force (IETF), describes a Multiaccess Reachability Protocol (MARP) that defines a protocol to quickly determine the existence or aliveness of devices attached to a shared media (broadcast) subnet, in particular, a protocol which allows for fast discovery when a device drops off of a broadcast media link for various purposes, including loss of routing protocol neighbors, and for fast notification of loss of connectivity to devices attached to such a shared media subnet. In particular, this protocol allows a router connected to a
Layer 2 network switch to request the transmission of an explicit notification message when a fault occurs that causes loss of connectivity with a neighboring router, for example, on the link between a neighboring router and the network switch. - US 2005/0018667 discloses a system and method for exchanging awareness information in a network environment, including receiving a packet at a network element and identifying a sequence number included in the packet that correlates to awareness information associated with one or more adjacent network elements. A table included in the network element may be updated in order to account for the awareness information included within the packet that has not been accounted for by the network element. In cases where the awareness information included in the packet has already been accounted for, the packet may be ignored.
- The Applicant has observed that the known solutions, and in particular the proposed MARP protocol, are capable of reducing the fault detection time but require that both the switch and the routers in the local network implement the MARP protocol, namely that the routers implement the functionality of a MARP protocol Client, while the switches must implement the functionality of the Server. However, a solution to the fault detection problem that requires that all the routers in the local area network implement the functionality of this new protocol constitutes a restriction which turns into a limitation in the practical application of the solution.
- The objective of the present invention is to provide a method and a system for reducing the delay in detecting a fault in a local area network, such as an Ethernet network, in which routers are interconnected via switches, without requiring any intervention on the routers.
- For the purposes of the present invention, switches are apparatuses suitable to process data packets at Layer 2 (Link Layer) of the OSI model, while routers are apparatuses suitable to process data packets at Layer 3 (Network Layer) of the OSI model.
- This objective is achieved by the present invention in that it relates to a method for reducing fault detection time in a network, to a network, and to a software product as defined in the appended claims.
- The present invention achieves the aforementioned objective by configuring a network switch, which is preferably an Ethernet switch, in such a manner that it may identify the routers connected to it, putting them in relation to the physical interfaces through which they are reachable and, when a fault occurs on one or more physical links to one or more IP routers, allows all of the other routers still connected to be immediately notified of the fault occurrence, so that they can rapidly reroute traffic on alternative routes, if available.
- The proposed method does not require any new functionality at IP router level and exploits the mechanisms of the routing protocols normally used on IP networks, especially those of the Link State type (OSPF and ISIS). The Ethernet switch, although not participating in the IP routing protocol together with the routers, is configured to intercept and generate routing messages. Then, the Ethernet switch, by intercepting the routing messages or through an explicit management system configuration, reconstructs the number and position of the routers directly connected to it. When a fault interrupts one or more of the links between the Ethernet switch and the routers, the switch is able to rapidly detect the fault through the
Ethernet Layer 2 functions, and can send a message to all of the IP routers still connected, signaling the fault occurrence and the consequent unreachability of certain routers. - Conveniently, the “hello” messages of the routing protocol can be used to communicate this information. These “hello” messages contain a list of the IP routers neighboring on the originating router, so that each router can check mutual reachability with its neighboring routers. Therefore, the immediate closure of the routing adjacencies may be triggered, causing the traffic to be rerouted, by simply generating a “hello” message with an empty neighbor list.
- In the following, the term “source router” designates a router that originates some traffic sent over a local area network to a second router attached to the same local area network, this second router being therefore designated as “destination router”.
- According to a first aspect thereof, the present invention thus relates to a method for reducing fault detection time in a telecommunication network including routers configured to exchange messages via at least one switch, the method comprising the steps of:
-
- snooping, by the switch, a message from a first router, to extract information from the message; and
- sending, by the switch, a network fault message based on the extracted information.
- Sending a network fault message preferably includes:
-
- generating, by the switch, a fake information based on the extracted information, the fake information being such as to cause, by a second router (different from the first) receiving the message, closure of connectivity with the first router; and
- sending, by the switch, the network fault message including the fake information.
- The extracted information preferably includes a list of routers reachable by the first router via the switch.
- The fake information preferably includes an empty list of routers reachable by the first router via the switch.
- Sending a network fault message may include:
-
- detecting, by the switch, a network fault that prevents the first router from being reachable via the switch; and
- sending, by the switch, the network fault message when the network fault is detected.
- The network fault message may be sent to all the other routers connected to the switch.
- Sending a network fault message preferably also includes determining routers connected to the switch.
- Determining routers connected to the switch may include:
-
- generating a correspondence table including mappings between interfaces of the switch and routers connected to the interfaces, each mapping including an identifier of the router, an identifier of the switch interface, and a message received from the router on the switch interface.
- The method may further comprise determining, by a network operator, the routers connected to the switch. Alternatively, the method may comprise determining, by the switch, the routers connected to the switch.
- Generating a correspondence table may include:
-
- snooping, by the switch, a message received from a router on a switch interface, to determine an identifier of the router;
- checking, by the switch, for a mapping in the correspondence table between the router and the receiving switch interface;
- if no mapping is found in the correspondence table, creating, by the switch, a new mapping in the correspondence table;
- if a mapping is found in the correspondence table, replacing, by the switch, the message in the correspondence table with the received one.
- Generating a correspondence table may further include:
-
- if no message is received from a router for a given time interval, deleting, by the switch, the corresponding mapping from the correspondence table.
- Sending a network fault message may include:
-
- checking, by the switch, for -mappings in the correspondence table associated with an unreachable router; and
- for each mapping found, sending, by the switch, a network fault message to the router in the mapping.
- The network is preferably a multiaccess local area network. The multiaccess local area network is preferably an Ethernet network.
- The present invention also relates to a switch for a telecommunication network, configured to implement the method according to the above.
- The present invention further relates to a network including at least one switch and routers configured to exchange messages via the switch, the switch being configured to implement the method according to the above.
- The present invention also relates to a software product able, when loaded and run in a switch of a network, to implement the method according to the above.
- For a better understanding of the present invention, preferred embodiments, which are intended purely by way of example and are not to be construed as limiting, will now be described with reference to the attached drawings, wherein:
-
FIG. 1 shows an example of traffic rerouting in a multiaccess local network with one Ethernet switch; -
FIG. 2 shows an example of traffic rerouting in a multiaccess local network with two Ethernet switches; -
FIG. 3 shows a flowchart of a learning phase of the method according to the present invention; -
FIG. 4 shows an example of a correspondence table; -
FIG. 5 shows a classical “hello” message generated by a network router; -
FIG. 6 shows a fake “hello” message generated by a network switch; and -
FIG. 7 shows a flowchart of an operating phase of the method according to the present invention. - The following discussion is presented to enable a person skilled in the art to make and use the invention. Various modifications to the embodiments will be readily apparent to those skilled in the art, and the generic principles herein may be applied to other embodiments and applications without departing from the spirit and scope of the present invention. Thus, the present invention is not intended to be limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein and defined in the attached claims.
- Reference will be made in the following to a telecommunication network including a plurality of routers and at least a switch connecting the routers, such as the one disclosed in
FIG. 1 , where A, B, D, E and F are routers and C is a switch, or the one disclosed inFIG. 2 , where A, C, E and F are routers and B and C are switches. - The present invention enables a network switch, in particular a
Layer 2 switch such as an Ethernet switch interconnecting IP routers, whilst not directly participating in the IP routing protocol, to intercept and generate certain routing messages, according to a procedure composed of two distinct phases: a learning phase and an operating phase. - In particular, in the learning phase, the Ethernet switch reconstructs a simplified map of IP routers connected to the Ethernet local network. The objective of this phase is to allow the Ethernet switch to know which IP routers are no longer connected to the Ethernet local network in the case of a fault affecting one of its interfaces. The map created by the switch consists of an internal correspondence table storing the association (mapping) between the identifier of each router (for example the MAC address) and the identifier of the interface on the switch itself, to which the router is directly connected, or, in the case where there are a number of cascaded-connected switches, the identifier of the interface via which the router may be reached.
- It is possible for the same router to be associated with more than one interface on the same Ethernet switch, but this can only happen if these interfaces belong to different virtual Local Area Networks (VLANs): in any case, the MAC address, being univocal at the global level, allows even these situations to be efficiently handled, discriminating between the various connections.
- For example, in the network topology shown in
FIG. 2 , where an Ethernet local network with two Ethernet switches B and D is shown, switch B creates a correspondence table between each one of its interfaces I1, I2, and I3 and routers connected thereto. In particular, the correspondence table of switch B contains one line for each of the four IP routers A, C, E and F: router A is associated with interface I1, router C with interface I2, and routers E and F with interface I3. - When the operating system of the Ethernet switch has been provided with the suitable configuration commands, the correspondence table can be explicitly configured by a network operator. This solution is however feasible only if the number of routers connected to the switch is not too high.
- An alternative solution consists in leaving the Ethernet switch with the task of constructing the correspondence table. To this end, according to an aspect of the present invention, the switch inspects the content of “hello” messages passing through it and exchanged by the IP routers connected through it, and uses the information they carry to build the correspondence table. This operation of inspection (i.e., reading) of the content of “hello” messages will be herein after called “snooping”.
- In particular, the most widespread Link State routing protocols (OSPF and IS-IS) send “hello” packets on the Ethernet network using reserved multicast addresses as the destination:
-
- OSPF: 0100.5E00.0005 (AllSPFRouters)
- IS-IS Level 1: 0180.C200.0014 (AllL1ISs)
- IS-IS Level 2: 0180.C200.0015 (AllL2ISs)
- Therefore, according to an aspect of the present invention, in order to identify “hello” messages exchanged by IP routers and passing through it, the Ethernet switch intercepts data packets in “hello” messages destined to these addresses, and processes these data packets according to the following procedure.
- A flow chart of a possible implementation of the learning phase is shown
FIG. 3 . - When the switch intercepts a message destined to one of the above-indicated addresses, it first carries out a syntax control in order to check that it is effectively a “hello” message (block 10) , and, if so, then checks in the correspondence table for a mapping between the input interface (port) on which the message has been received and the MAC address of router that has sent the message (blocks 20 and 30). If no mapping is found in the correspondence table, the switch creates a new entry (line) in the correspondence table, inserting the mapping between the identifier of the input interface on which the “hello” message has been received and the MAC address of the router that has sent the “hello” message, and also saves the received “hello” message in the correspondence table (block 40). If instead a mapping exists in the correspondence table between the input interface on which the message has been received and the MAC address of the router that has sent the message, the “hello” message from this router already present in the correspondence table is replaced by the one just received, so as to update the information relating to this router in such a way that a copy of the last “hello” message intercepted is always saved in the correspondence table (block 50).
-
FIG. 4 shows an example of a correspondence table relating to switch B inFIG. 2 , wherein the first column indicates the switch interfaces, the second column indicates the MAC addresses of the routers connected to the switch interfaces, the third column indicates the saved “hello” message, and each line indicates a mapping between a switch interface and a router connected thereto. - In particular, the received “hello” messages are saved in the correspondence table to allow the switch to emulate the generation of a “hello” message that is semantically correct and consistent with the configuration of the routing protocol, as will be described in detail further on with reference to the flowchart shown in
FIG. 7 and relating to the operating phase. - A refresh timer is also associated with each line in the correspondence table. When a new line is created (block 40), the refresh timer is initialized with a predefined value that, for example, could be equal to the value of the dead-interval parameter utilized by the OSPF protocol. Until no new “hello” message is received, the timer is decremented by one unit every second, but when a new “hello” message is received and saved in the correspondence table, the refresh timer associated to. the updated line is re-initialized again with the default value (block 50). If the refresh timer becomes equal to zero, the switch understands that there is a loss of connectivity on the considered interface, and the corresponding line is cancelled from the correspondence table.
- When the Ethernet switch detects and identifies a loss of connectivity on one of its own interfaces, it carries out the aforementioned operating phase to immediately communicate this information to the IP routers connected thereto.
- In particular, according to an aspect of the present invention, this loss of connectivity is communicated to the neighboring routers by means of a fake “hello” message semantically consistent with those sent by the routers. This “hello” message is called “fake” in that it is semantically consistent with those sent by the routers and therefore it is recognized by the other routers as a classical “hello” message, but the content is different from that of a classical “hello” message, as herein below explained.
- In routing protocols of the Link State type, such as OSPF and IS-IS, each “hello” message sent by a router typically contains an identifier of the router and the list of the IP neighboring routers from which a “hello” message has already been received, so that each couple of routers can check reciprocal reachability in a straightforward manner. Still according to the present invention, differently from a classical “hello” message generated by a router, a switch generates a fake “hello” message containing “fake information” represented by an empty neighboring router list or, from another point of view, by the absence of a neighboring router list. This fake “hello” message still contains the identifier of a sender router, which is the router connected (directly or through another switch) to the interface where fault has been detected. In case of more than one router connected to such interface, a fake “hello” message is generated for each of these routers.
- Generating and sending a fake “hello” message with an empty neighboring router list causes the receiving router to immediately close routing adjacencies with the sending router, triggering the traffic rerouting. This behavior is provided for by both the OSPF protocol and the IS-IS protocol.
FIGS. 5 and 6 show a classical “hello” message generated by a router and a fake “hello” message generated by a switch, respectively. In particular, both classical and fake “hello” messages includes records containing IP Packet Header, OSPF Header, Network Mask, Hello Interval, Options, Priority, Dead Interval, Designated Router, Backup Designated Router. The classical “hello” message generated by a router further includes an IP Neighboring Router ID list, i.e., includes an additional record for each neighboring router and containing the corresponding IP neighboring router ID, while the fake “hello” message generated by a switch includes an empty IP Neighboring Router ID list, i.e., does not include any additional record for each neighboring router. -
FIG. 7 shows a flow chart of a possible implementation of the operating phase. - Once an Ethernet switch has detected a link fault (block 60) , it checks the number of entries (lines) in the correspondence table which are related to the switch interface involved in the fault, i.e. the number of IP routers reached via this switch interface (blocks 70 and 80). For each mapping associated with this switch interface (i.e. for each router connected, directly or through other switches, to this interface), the switch then uses the corresponding “hello” message to generate a fake “hello” message with an empty neighboring router list (i.e., it deletes the records containing the ID of the neighboring routers), broadcasts it on all its interfaces (ports), and finally deletes the corresponding entry from the correspondence table (block 90). Therefore a fake “hello” message, using the source address of the router on behalf of which the message is sent, is generated for each of the above mentioned IP routers. If the last “hello” message received on the faulty switch interface is stored in the correspondence table, the switch can create the fake “hello” message from this last message, by emptying the neighboring router list, updating the “Size of Datagram” field in the IP header and the “Length” field in the OSPF header, and recomputing the Cyclic Redundancy Check (CRC), which is a well-known field of the Ethernet packet, typically of four bytes, used to detect errors that occur during transmission. In this way, it is guaranteed that the Ethernet switch utilizes updated and semantically correct information, and thus suitable for being opportunely processed by the receiving routers. According to the known routing protocols, the fake “hello” message is sent over the Ethernet local network to a predefined multicast IP address, which causes it to be received and processed by all of the IP routers that participate in the routing protocol. The receiving routers, not seeing their own identifiers in the neighboring router list contained in the fake “hello” message, declare the adjacency with the sending router closed and reroute traffic on a new route. The effect of generating a fake “hello” message by a switch causes the closure of adjacencies with neighboring routers that can no longer be reachable by the routers affected by the fault event, ultimately determining the desired rerouting of traffic, shortening the response times.
- With reference again to
FIG. 1 , in the case of a fault of link LEC, the proposed method allows switch C to immediately inform routers A, B, and D of this event by sending a fake “hello” message with router E as the sender and an empty neighboring router list. In order to perform this, switch C first creates an association between interface I4 and router E, via static configuration or intercepting the “hello” messages sent by the router E. When interface I4 is no longer active, switch C is able to inform the other routers in accordance with the already described method. - The advantages of the present invention are evident from the foregoing description. In particular, the present invention allows more rapid and efficient detection of loss of reachability between neighboring routers in a network, by intervening at the switch level only, i.e., without requiring that all of the routers implement the new functionality.
- It is clear that numerous modifications and variants can be made to the present invention, all falling within the scope of the invention, as defined in the appended claims.
Claims (19)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2005/013995 WO2007073752A1 (en) | 2005-12-23 | 2005-12-23 | Method for reducing fault detection time in a telecommunication network |
Publications (2)
Publication Number | Publication Date |
---|---|
US20090109862A1 true US20090109862A1 (en) | 2009-04-30 |
US8085654B2 US8085654B2 (en) | 2011-12-27 |
Family
ID=36143289
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/086,973 Expired - Fee Related US8085654B2 (en) | 2005-12-23 | 2005-12-23 | Method for reducing fault detection time in a telecommunication network |
Country Status (5)
Country | Link |
---|---|
US (1) | US8085654B2 (en) |
EP (1) | EP1964330B1 (en) |
AT (1) | ATE477651T1 (en) |
DE (1) | DE602005022951D1 (en) |
WO (1) | WO2007073752A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100325112A1 (en) * | 2009-06-16 | 2010-12-23 | Spoknit, Inc. | Method for responding to a plurality of electronic messages |
US20110030055A1 (en) * | 2009-07-31 | 2011-02-03 | Rajini Balay | Detecting Spoofing in Wireless Digital Networks |
US10367848B2 (en) * | 2014-09-25 | 2019-07-30 | Nec Corporation | Transmitting relay device identification information in response to broadcast request if device making request is authorized |
US11411810B2 (en) * | 2016-12-12 | 2022-08-09 | Huawei Technologies Co., Ltd. | Fault locating method and network device |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7895345B2 (en) * | 2007-04-13 | 2011-02-22 | Microsoft Corporation | Distributed routing table architecture and design |
WO2009049327A2 (en) * | 2007-10-12 | 2009-04-16 | Tellabs Operations, Inc. | Sharing value of network variables with successively active interfaces of a communication node |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6301224B1 (en) * | 1998-01-13 | 2001-10-09 | Enterasys Networks, Inc. | Network switch with panic mode |
US6515967B1 (en) * | 1998-06-30 | 2003-02-04 | Cisco Technology, Inc. | Method and apparatus for detecting a fault in a multicast routing infrastructure |
US6763190B2 (en) * | 2000-03-03 | 2004-07-13 | Lucent Technologies Inc. | Network auto-provisioning and distributed restoration |
US20050018667A1 (en) * | 2003-07-24 | 2005-01-27 | Cisco Technology, Inc. | System and method for exchanging awareness information in a network environment |
US6950427B1 (en) * | 2001-08-09 | 2005-09-27 | Cisco Technology, Inc. | Technique for resynchronizing LSDB in OSPF after a software reload in a non-stop forwarding intermediate node of a computer network |
US7644317B1 (en) * | 2004-06-02 | 2010-01-05 | Cisco Technology, Inc. | Method and apparatus for fault detection/isolation in metro Ethernet service |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7152179B1 (en) * | 2002-09-19 | 2006-12-19 | Cisco Technology, Inc. | IP redundancy with improved failover notification |
-
2005
- 2005-12-23 DE DE602005022951T patent/DE602005022951D1/en active Active
- 2005-12-23 WO PCT/EP2005/013995 patent/WO2007073752A1/en active Application Filing
- 2005-12-23 EP EP05850350A patent/EP1964330B1/en not_active Not-in-force
- 2005-12-23 AT AT05850350T patent/ATE477651T1/en not_active IP Right Cessation
- 2005-12-23 US US12/086,973 patent/US8085654B2/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6301224B1 (en) * | 1998-01-13 | 2001-10-09 | Enterasys Networks, Inc. | Network switch with panic mode |
US6515967B1 (en) * | 1998-06-30 | 2003-02-04 | Cisco Technology, Inc. | Method and apparatus for detecting a fault in a multicast routing infrastructure |
US6763190B2 (en) * | 2000-03-03 | 2004-07-13 | Lucent Technologies Inc. | Network auto-provisioning and distributed restoration |
US6950427B1 (en) * | 2001-08-09 | 2005-09-27 | Cisco Technology, Inc. | Technique for resynchronizing LSDB in OSPF after a software reload in a non-stop forwarding intermediate node of a computer network |
US20050018667A1 (en) * | 2003-07-24 | 2005-01-27 | Cisco Technology, Inc. | System and method for exchanging awareness information in a network environment |
US7644317B1 (en) * | 2004-06-02 | 2010-01-05 | Cisco Technology, Inc. | Method and apparatus for fault detection/isolation in metro Ethernet service |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100325112A1 (en) * | 2009-06-16 | 2010-12-23 | Spoknit, Inc. | Method for responding to a plurality of electronic messages |
US8417706B2 (en) * | 2009-06-16 | 2013-04-09 | Isentium Technologies Inc. | Method for responding to a plurality of electronic messages |
US8589401B2 (en) | 2009-06-16 | 2013-11-19 | Isentium Technologies Inc. | Method for responding to a plurality of electronic messages |
US20110030055A1 (en) * | 2009-07-31 | 2011-02-03 | Rajini Balay | Detecting Spoofing in Wireless Digital Networks |
US10367848B2 (en) * | 2014-09-25 | 2019-07-30 | Nec Corporation | Transmitting relay device identification information in response to broadcast request if device making request is authorized |
US11411810B2 (en) * | 2016-12-12 | 2022-08-09 | Huawei Technologies Co., Ltd. | Fault locating method and network device |
Also Published As
Publication number | Publication date |
---|---|
EP1964330B1 (en) | 2010-08-11 |
EP1964330A1 (en) | 2008-09-03 |
US8085654B2 (en) | 2011-12-27 |
DE602005022951D1 (en) | 2010-09-23 |
ATE477651T1 (en) | 2010-08-15 |
WO2007073752A1 (en) | 2007-07-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7693047B2 (en) | System and method for PE-node protection | |
CN105743689B (en) | Fast convergence of link failures in a multi-homed ethernet virtual private network | |
US7471669B1 (en) | Routing of protocol data units within a communication network | |
JP5542927B2 (en) | Inter-node link aggregation system and method | |
US9276898B2 (en) | Method and device for link fault detecting and recovering based on ARP interaction | |
EP2364539B1 (en) | A system and method of implementing lightweight not-via ip fast reroutes in a telecommunications network | |
EP2533475B1 (en) | Method and system for host route reachability in packet transport network access ring | |
US7778204B2 (en) | Automatic maintenance of a distributed source tree (DST) network | |
US20090245259A1 (en) | Fast reroute (frr) protection at the edge of a rfc 2547 network | |
US20070180105A1 (en) | Technique for distinguishing between link and node failure using bidirectional forwarding detection (BFD) | |
US20130176843A1 (en) | Routing protocols for accommodating nodes with redundant routing facilities | |
KR100840136B1 (en) | Traffic network flow control using dynamically modified metrics for redundancy connections | |
US20080101219A1 (en) | Ring Rapid Multiple Spanning Tree Protocol System and Method | |
US20100061227A1 (en) | Method to reduce routing convergence at the edge | |
KR20150056159A (en) | A method operating of a controller and a switch to resolve network error, and the controller and the switch therefor | |
US12068955B2 (en) | Method for controlling traffic forwarding, device, and system | |
JPWO2005057864A1 (en) | Network path switching system | |
US6820120B1 (en) | Routing of data packets in heterogeneous networks | |
CN113615132B (en) | Fast flood Hong Tapu protection | |
US8085654B2 (en) | Method for reducing fault detection time in a telecommunication network | |
CN113366804A (en) | Method and system for preventing micro-loops during network topology changes | |
US10735252B2 (en) | Outside router fault detection | |
US7269176B1 (en) | Communications arrangement | |
JP3887301B2 (en) | Frame forwarding network | |
JP3546328B2 (en) | Router for communication network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: TELECOM ITALIA S.P.A., ITALY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CAPELLO, ALESSANDRO;MERULLA, CLAUDIO;VERCELLONE, VINICIO;REEL/FRAME:021183/0748 Effective date: 20060109 |
|
ZAAA | Notice of allowance and fees due |
Free format text: ORIGINAL CODE: NOA |
|
ZAAB | Notice of allowance mailed |
Free format text: ORIGINAL CODE: MN/=. |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20231227 |